[info] Using makefile-style concurrent boot in runlevel 2. [ 43.713592][ T27] audit: type=1800 audit(1576303358.908:21): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.742201][ T27] audit: type=1800 audit(1576303358.908:22): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.24' (ECDSA) to the list of known hosts. 2019/12/14 06:02:50 fuzzer started 2019/12/14 06:02:51 dialing manager at 10.128.0.105:44249 2019/12/14 06:02:51 checking machine... 2019/12/14 06:02:51 checking revisions... 2019/12/14 06:02:51 testing simple program... syzkaller login: [ 56.941610][ T7840] IPVS: ftp: loaded support on port[0] = 21 2019/12/14 06:02:52 building call list... [ 57.332266][ T2555] tipc: TX() has been purged, node left! executing program [ 60.101377][ T7827] can: request_module (can-proto-0) failed. [ 60.113651][ T7827] can: request_module (can-proto-0) failed. [ 60.125867][ T7827] can: request_module (can-proto-0) failed. 2019/12/14 06:02:58 syscalls: 2686 2019/12/14 06:02:58 code coverage: enabled 2019/12/14 06:02:58 comparison tracing: enabled 2019/12/14 06:02:58 extra coverage: enabled 2019/12/14 06:02:58 setuid sandbox: enabled 2019/12/14 06:02:58 namespace sandbox: enabled 2019/12/14 06:02:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/14 06:02:58 fault injection: enabled 2019/12/14 06:02:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/14 06:02:58 net packet injection: enabled 2019/12/14 06:02:58 net device setup: enabled 2019/12/14 06:02:58 concurrency sanitizer: enabled 2019/12/14 06:02:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 06:02:59 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x26000, 0x0, 0x7f, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000002c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) socket$rxrpc(0x21, 0x2, 0xa) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r1, 0x2285, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d246800005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000100)="aa1d484e24002000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600097704a71e023a27", 0x2a}], 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, 0x0) stat(0x0, 0x0) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r4, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x808000, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00)={0x0}, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/full\x00', 0x2, 0x0) perf_event_open(0x0, r6, 0x0, r7, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000c00)={0x0}, 0x0) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/full\x00', 0x2, 0x0) perf_event_open(0x0, r9, 0x0, r10, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r11, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @bt={0x0, 0x3, 0x0, 0x746, 0x4, 0x400, 0x66eea1a1b007f280, 0xd}}) ioctl$TIOCGSID(r11, 0x5429, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000640)='.\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00)={0x0}, 0x0) perf_event_open(0x0, r12, 0x0, 0xffffffffffffffff, 0xa) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/full\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, r13, 0x0) clone3(&(0x7f00000008c0)={0x0, &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780), 0x2f, 0x0, &(0x7f00000007c0)=""/59, 0x3b, &(0x7f0000000800)=""/162}, 0x40) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e24, @broadcast}}}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x8a061, 0x0) 06:02:59 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0xa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 64.744810][ T7885] IPVS: ftp: loaded support on port[0] = 21 [ 64.842440][ T7885] chnl_net:caif_netlink_parms(): no params data found [ 64.870944][ T7885] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.878570][ T7885] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.886915][ T7885] device bridge_slave_0 entered promiscuous mode [ 64.895327][ T7885] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.902499][ T7885] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.910607][ T7885] device bridge_slave_1 entered promiscuous mode [ 64.928242][ T7885] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.939763][ T7885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.960299][ T7885] team0: Port device team_slave_0 added [ 64.967530][ T7885] team0: Port device team_slave_1 added 06:03:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001780)="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", 0x401}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f00000000c0)={0x4, 0x2, 0x800, 0x3ff, 'syz0\x00'}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 65.024439][ T7885] device hsr_slave_0 entered promiscuous mode [ 65.092883][ T7885] device hsr_slave_1 entered promiscuous mode [ 65.144958][ T7888] IPVS: ftp: loaded support on port[0] = 21 [ 65.182221][ T7885] netdevsim netdevsim0 netdevsim0: renamed from eth0 06:03:00 executing program 3: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.u'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',aname=G']) open(&(0x7f0000000200)='./file0\x00', 0x40400, 0x0) [ 65.244502][ T7885] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 65.324150][ T7890] IPVS: ftp: loaded support on port[0] = 21 [ 65.358976][ T7885] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 65.402866][ T7885] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.487044][ T7892] IPVS: ftp: loaded support on port[0] = 21 [ 65.522732][ T7885] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.529822][ T7885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.537244][ T7885] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.544350][ T7885] bridge0: port 1(bridge_slave_0) entered forwarding state 06:03:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) close(r2) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f000000f000/0x18000)=nil, 0x0, 0xffffff1c, 0x0, 0x0, 0x0) [ 65.661412][ T7888] chnl_net:caif_netlink_parms(): no params data found [ 65.794360][ T7890] chnl_net:caif_netlink_parms(): no params data found [ 65.826843][ T7885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.856946][ T7888] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.864757][ T7888] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.874217][ T7888] device bridge_slave_0 entered promiscuous mode [ 65.887243][ T7885] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.914593][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.934061][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.942245][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.965434][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 65.992230][ T7888] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.999315][ T7888] bridge0: port 2(bridge_slave_1) entered disabled state 06:03:01 executing program 5: r0 = socket(0x2, 0x3, 0x40000000000000ff) sendto$inet(r0, &(0x7f0000dc2fe8)="d704000000000000000100000000040009001e88", 0x14, 0x810, &(0x7f0000000ff0)={0x2, 0x0, @loopback}, 0x10) [ 66.009939][ T7888] device bridge_slave_1 entered promiscuous mode [ 66.042268][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.051258][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.060379][ T7899] IPVS: ftp: loaded support on port[0] = 21 [ 66.086787][ T3603] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.093952][ T3603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.115290][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.133097][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.141601][ T3603] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.148669][ T3603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.188099][ T7890] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.195420][ T7890] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.204583][ T7890] device bridge_slave_0 entered promiscuous mode [ 66.211721][ T7892] chnl_net:caif_netlink_parms(): no params data found [ 66.233061][ T2976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.253782][ T7890] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.260937][ T7890] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.269391][ T7890] device bridge_slave_1 entered promiscuous mode [ 66.293581][ T7888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.318453][ T7888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.335396][ T7890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.347659][ T7892] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.352123][ T7901] IPVS: ftp: loaded support on port[0] = 21 [ 66.355062][ T7892] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.368615][ T7892] device bridge_slave_0 entered promiscuous mode [ 66.376422][ T7845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.398169][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.406238][ C0] ================================================================== [ 66.406279][ C0] BUG: KCSAN: data-race in add_timer / run_timer_softirq [ 66.406282][ C0] [ 66.406295][ C0] read to 0xffff88812c01da88 of 8 bytes by task 394 on cpu 1: [ 66.406310][ C0] add_timer+0x16f/0x550 [ 66.406326][ C0] __queue_delayed_work+0x13b/0x1d0 [ 66.406339][ C0] queue_delayed_work_on+0xf3/0x110 [ 66.406358][ C0] bond_netdev_notify_work+0x150/0x160 [ 66.406371][ C0] process_one_work+0x3d4/0x890 [ 66.406383][ C0] worker_thread+0xa0/0x800 [ 66.406394][ C0] kthread+0x1d4/0x200 [ 66.406411][ C0] ret_from_fork+0x1f/0x30 [ 66.406414][ C0] [ 66.406424][ C0] write to 0xffff88812c01da88 of 8 bytes by interrupt on cpu 0: [ 66.406438][ C0] run_timer_softirq+0x496/0xcd0 [ 66.406449][ C0] __do_softirq+0x115/0x33f [ 66.406462][ C0] irq_exit+0xbb/0xe0 [ 66.406474][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 66.406485][ C0] apic_timer_interrupt+0xf/0x20 [ 66.406499][ C0] console_unlock+0x8fa/0xb80 [ 66.406512][ C0] vprintk_emit+0x38f/0x4e0 [ 66.406523][ C0] vprintk_default+0x31/0x50 [ 66.406535][ C0] vprintk_func+0x85/0x140 [ 66.406546][ C0] printk+0x69/0x91 [ 66.406558][ C0] addrconf_notify.cold+0x2e/0x6e [ 66.406573][ C0] notifier_call_chain+0xd7/0x160 [ 66.406586][ C0] raw_notifier_call_chain+0x37/0x50 [ 66.406601][ C0] call_netdevice_notifiers_info+0x9a/0x120 [ 66.406613][ C0] netdev_state_change+0xb2/0xd0 [ 66.406626][ C0] linkwatch_do_dev+0xd8/0xf0 [ 66.406638][ C0] __linkwatch_run_queue+0x1a9/0x510 [ 66.406649][ C0] linkwatch_event+0x54/0x70 [ 66.406662][ C0] process_one_work+0x3d4/0x890 [ 66.406674][ C0] worker_thread+0xa0/0x800 [ 66.406685][ C0] kthread+0x1d4/0x200 [ 66.406698][ C0] ret_from_fork+0x1f/0x30 [ 66.406700][ C0] [ 66.406704][ C0] Reported by Kernel Concurrency Sanitizer on: [ 66.406719][ C0] CPU: 0 PID: 3603 Comm: kworker/0:2 Not tainted 5.5.0-rc1-syzkaller #0 [ 66.406727][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.406740][ C0] Workqueue: events linkwatch_event [ 66.406747][ C0] ================================================================== [ 66.406754][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 66.406767][ C0] CPU: 0 PID: 3603 Comm: kworker/0:2 Not tainted 5.5.0-rc1-syzkaller #0 [ 66.406774][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.406785][ C0] Workqueue: events linkwatch_event [ 66.406791][ C0] Call Trace: [ 66.406795][ C0] [ 66.406818][ C0] dump_stack+0x11d/0x181 [ 66.406836][ C0] panic+0x210/0x640 [ 66.406852][ C0] ? vprintk_func+0x8d/0x140 [ 66.406867][ C0] kcsan_report.cold+0xc/0xd [ 66.406884][ C0] kcsan_setup_watchpoint+0x3fe/0x460 [ 66.406897][ C0] ? __queue_work+0x910/0x910 [ 66.406911][ C0] __tsan_unaligned_write8+0xc7/0x110 [ 66.406926][ C0] run_timer_softirq+0x496/0xcd0 [ 66.406945][ C0] ? kvm_sched_clock_read+0x9/0x20 [ 66.406960][ C0] ? sched_clock+0x13/0x20 [ 66.406974][ C0] ? sched_clock_cpu+0x15/0xe0 [ 66.406989][ C0] __do_softirq+0x115/0x33f [ 66.407006][ C0] irq_exit+0xbb/0xe0 [ 66.407019][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 66.407033][ C0] apic_timer_interrupt+0xf/0x20 [ 66.407037][ C0] [ 66.407052][ C0] RIP: 0010:console_unlock+0x8fa/0xb80 [ 66.407068][ C0] Code: e8 6b 55 00 00 48 c7 c7 18 64 c5 85 e8 7f a1 1b 00 48 83 3d 2f 52 8e 04 00 0f 84 69 02 00 00 e8 ac f7 0d 00 48 8b 7d a0 57 9d <0f> 1f 44 00 00 48 c7 c7 10 64 c5 85 e8 55 a1 1b 00 48 83 3d fd 51 [ 66.407076][ C0] RSP: 0018:ffffc9000888f9d0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 66.407089][ C0] RAX: ffff888126974040 RBX: 0000000000000000 RCX: ffffffff86254588 [ 66.407097][ C0] RDX: 0000000000000000 RSI: ffffffff813711f4 RDI: 0000000000000293 [ 66.407105][ C0] RBP: ffffc9000888fa40 R08: 0000000000000000 R09: 0000ffff85c56418 [ 66.407114][ C0] R10: 0000ffff8620c798 R11: 0000ffff85c5641f R12: ffffffff82ead5b0 [ 66.407122][ C0] R13: 0000000000000000 R14: 0000000000000001 R15: ffffc9000888fa08 [ 66.407135][ C0] ? write_ext_msg+0x360/0x360 [ 66.407151][ C0] ? console_unlock+0x8f4/0xb80 [ 66.407171][ C0] vprintk_emit+0x38f/0x4e0 [ 66.407189][ C0] vprintk_default+0x31/0x50 [ 66.407203][ C0] vprintk_func+0x85/0x140 [ 66.407216][ C0] printk+0x69/0x91 [ 66.407232][ C0] addrconf_notify.cold+0x2e/0x6e [ 66.407250][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 66.407266][ C0] ? __this_cpu_preempt_check+0x45/0x140 [ 66.407282][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 66.407300][ C0] ? ip6mr_device_event+0x51/0x1a0 [ 66.407318][ C0] notifier_call_chain+0xd7/0x160 [ 66.407333][ C0] ? notifier_call_chain+0xd7/0x160 [ 66.407351][ C0] raw_notifier_call_chain+0x37/0x50 [ 66.407366][ C0] call_netdevice_notifiers_info+0x9a/0x120 [ 66.407380][ C0] netdev_state_change+0xb2/0xd0 [ 66.407395][ C0] linkwatch_do_dev+0xd8/0xf0 [ 66.407409][ C0] __linkwatch_run_queue+0x1a9/0x510 [ 66.407426][ C0] linkwatch_event+0x54/0x70 [ 66.407440][ C0] process_one_work+0x3d4/0x890 [ 66.407460][ C0] worker_thread+0xa0/0x800 [ 66.407478][ C0] kthread+0x1d4/0x200 [ 66.407492][ C0] ? rescuer_thread+0x6a0/0x6a0 [ 66.407503][ C0] ? kthread_unpark+0xe0/0xe0 [ 66.407519][ C0] ret_from_fork+0x1f/0x30 [ 66.408740][ C0] Kernel Offset: disabled [ 66.936232][ C0] Rebooting in 86400 seconds..